2012
DOI: 10.1007/978-3-642-31284-7_22
|View full text |Cite
|
Sign up to set email alerts
|

A Prefiltering Approach to Regular Expression Matching for Network Security Systems

Abstract: Abstract. Regular expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory, but are too slow. In this paper, we propose RegexFilter, a prefiltering approach. The basic idea is to generate the RegEx print of RegEx set and use it … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Efficiency of pattern matching has been actively pursued in the fields of database [17], [18] and networking [12], [19], [26]- [29]. In these fields, issues in hardware architecturesuch as speed gap between L1/L2 caches and main memoryconstitute situations similar to that of embedded monitors that we discussed in the above.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Efficiency of pattern matching has been actively pursued in the fields of database [17], [18] and networking [12], [19], [26]- [29]. In these fields, issues in hardware architecturesuch as speed gap between L1/L2 caches and main memoryconstitute situations similar to that of embedded monitors that we discussed in the above.…”
Section: Related Workmentioning
confidence: 99%
“…In database and networking, pattern matching against regular expressions is mainly approached by application-specific heuristics that often take machine architecture into account. For example, in [19], [26] pattern regular expressions undergo application of some application-specific rewrite rules. The hierarchical structure of L1/L2 caches and main memory is exploited in [17], [18], while the features of content-addressable memory (CAM)-an alternative to RAM often used in network devices-are exploited in [12].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, even if techniques such as D2FA [13, 14] are employed, tables of DFA and NFA are too big to be stored in TCAMs. In 2012, the RegexFilter (a high-speed and memory efficient technique) was presented by Liu et al [15]. Regular expression matching was been sped up by quickly searching these regular expressions that may match each arriving item as little as possible.…”
Section: Regular Expression Two-stage Matching Strategy [11]mentioning
confidence: 99%
“…An item that does not match any regular expression in the set [15] is unmatched item of a regular expression set. Given an item i , it will match against R ′ to get set O ( R ′; i ) firstly.…”
Section: Regular Expression Two-stage Matching Strategy [11]mentioning
confidence: 99%